Verwandte Artikel zu Security Log Management: Identifying Patterns in the...

Security Log Management: Identifying Patterns in the Chaos - Softcover

 
9781597490429: Security Log Management: Identifying Patterns in the Chaos

Inhaltsangabe

This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the Top 10 security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the Top 10 list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site. Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of "log file". This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity.

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.

Reseña del editor

This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the “Top 10 security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the “Top 10 list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site.

Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of “log file. This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity.

* Provides turn-key, inexpensive, open source solutions for system administrators to analyze and evaluate the overall performance and security of their network
* Dozens of working scripts and tools presented throughout the book are available for download from Syngress Solutions Web site.
* Will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.

Gebraucht kaufen

Zustand: Sehr gut
Ancien livre de bibliothèque. Edition...
Diesen Artikel anzeigen

EUR 3,99 für den Versand von Frankreich nach Deutschland

Versandziele, Kosten & Dauer

EUR 5,77 für den Versand von Vereinigtes Königreich nach Deutschland

Versandziele, Kosten & Dauer

Suchergebnisse für Security Log Management: Identifying Patterns in the...

Beispielbild für diese ISBN

Jacob Babbin
Verlag: Syngress, 2006
ISBN 10: 1597490423 ISBN 13: 9781597490429
Gebraucht Softcover

Anbieter: Ammareal, Morangis, Frankreich

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Softcover. Zustand: Très bon. Ancien livre de bibliothèque. Edition 2006. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Former library book. Edition 2006. Ammareal gives back up to 15% of this item's net price to charity organizations. Artikel-Nr. F-158-375

Verkäufer kontaktieren

Gebraucht kaufen

EUR 3,41
Währung umrechnen
Versand: EUR 3,99
Von Frankreich nach Deutschland
Versandziele, Kosten & Dauer

Anzahl: 1 verfügbar

In den Warenkorb

Beispielbild für diese ISBN

Babbin, Jacob; Kleiman, Dave; Carter, Everett F., Jr.
Verlag: Syngress Publishing, 2006
ISBN 10: 1597490423 ISBN 13: 9781597490429
Gebraucht Paperback

Anbieter: ThriftBooks-Dallas, Dallas, TX, USA

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.15. Artikel-Nr. G1597490423I4N00

Verkäufer kontaktieren

Gebraucht kaufen

EUR 12,39
Währung umrechnen
Versand: EUR 7,38
Von USA nach Deutschland
Versandziele, Kosten & Dauer

Anzahl: 1 verfügbar

In den Warenkorb

Beispielbild für diese ISBN

Jacob Babbin; Dave Kleiman; Everett F. Carter Jr.; Jeremy Faircloth; Mark Burnett; Esteban Gutierrez
Verlag: Syngress, 2006
ISBN 10: 1597490423 ISBN 13: 9781597490429
Neu Softcover

Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Zustand: New. In. Artikel-Nr. ria9781597490429_new

Verkäufer kontaktieren

Neu kaufen

EUR 57,82
Währung umrechnen
Versand: EUR 5,77
Von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & Dauer

Anzahl: Mehr als 20 verfügbar

In den Warenkorb

Foto des Verkäufers

Babbin, Jacob
Verlag: Syngress Media, 2006
ISBN 10: 1597490423 ISBN 13: 9781597490429
Neu Softcover

Anbieter: moluna, Greven, Deutschland

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Zustand: New. Teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be used to make their networks efficient and secure using primarily open source tools. This book begins by discussing . Artikel-Nr. 596371664

Verkäufer kontaktieren

Neu kaufen

EUR 70,10
Währung umrechnen
Versand: Gratis
Innerhalb Deutschlands
Versandziele, Kosten & Dauer

Anzahl: Mehr als 20 verfügbar

In den Warenkorb